EP0589884A1 - Secured method for loading a plurality of applications into a microprocessor memory card. - Google Patents
Secured method for loading a plurality of applications into a microprocessor memory card.Info
- Publication number
- EP0589884A1 EP0589884A1 EP92903974A EP92903974A EP0589884A1 EP 0589884 A1 EP0589884 A1 EP 0589884A1 EP 92903974 A EP92903974 A EP 92903974A EP 92903974 A EP92903974 A EP 92903974A EP 0589884 A1 EP0589884 A1 EP 0589884A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- application
- applications
- rights
- data
- data tables
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
- G06Q20/35765—Access rights to memory zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3672—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
Definitions
- the present invention was made in collaboration with the University of Sciences and Techniques of Lille, CERIM and LIFL Laboratories. It relates to a secure method for loading several applications into a memory card provided with a microprocessor, often called a smart card.
- a microprocessor often called a smart card.
- Such smart cards typically have three types of use. In a first use of identification they constitute keys allowing their bearer to access a place or a
- data storage for example, for the purpose of managing one's health, each individual is provided with a card in which his medical record can be recorded, or else the card can replace a menu
- the present invention aims to allow the coexistence, on the same card, of these different uses, without the use of the card made for an application being able to harm the use of the card.
- the invention provides a secure method of loading the various applications so that they cannot interfere with each other.
- the invention also covers the ease of structuring
- FIG. 1 gives an example of sharing the memory of a smart card to suit several applications.
- a memory of such a smart card is in this case physically divided into two essential parts.
- a first part 1 of description contains descriptors, a second part 2 comprising areas of pure storage.
- a descriptor is representative of an application. It has a number of bytes in binary language.
- a first byte 3 is said to be an identifying byte. It is used to designate the application. If, at the time of a transaction with the card, a secret code is presented and the identification of the application is immediately ended up in the descriptor for which the identifier corresponds to the secret code presented.
- a descriptor also includes, after the identifier, a protection 4.
- a first byte of this protection 4 concerns the read protection of the words in the memory, another byte concerning the write protection, a third and a fourth byte concerning the erasure or the update if otherwise the technology (EEPROM) of the card allows it.
- EEPROM technology
- the third bit (or another bit) of the second protection byte prohibits writing if its value is zero or on the contrary authorizes it if its value is one (or possibly the opposite) .
- for erasure or update for erasure or update.
- a descriptor finally includes a number 5 of the memory words used by the application concerned. This number is coded for example on two bytes after the protection codes 4.
- An application concerned by a descriptor can thus contain a number of memory words equal to any number: for example 18.
- an instruction from the chip card microprocessor calculates that the first address of the 18 authorized words is equal to the sum, increased by one, of the words allocated to the previous descriptors in the list of descriptors of the smart card. The last authorized address is equal to this sum increased by the number of words indicated in the descriptor: that is to say here 18.
- the microprocessors therefore currently include, in their instruction set, instructions organized in sequence and stored in a manner definitive in the memory (ROM) of the smart card, at the end of which on the one hand it is possible to identify a chosen application, and on the other hand it is known to limit irreversibly access to an allocated set of memory words.
- this instruction set a creation instruction by which it is possible to add a descriptor following the descriptors already present (insofar as the place in memory allows) , and to allocate to this application described by this descriptor a number of memory words (again as a function of a memory space available in the card).
- the memory area allocated to a new application is completely independent of that allocated to previous applications.
- This technique while being effective has a first limitation which is that of prohibiting an application from going to work in the memory area reserved for another previously recorded application. This is understandable since it is the security purpose of the system. However, in certain cases, it is possible that the holder of an application wishes, in a complementary application that he himself would program, to access one or more memory zones that he has previously allocated. There it is not possible.
- the structure is not flexible.
- the solution would be for the banker to delete one of the applications, and to enter another application, as a replacement, which would include all of the instructions for the previous applications. This causes a loss of space in the card. As we also know that the memory sizes in these cards are limited, we understand that this technique is not without drawbacks.
- the last bytes of the descriptor provide information on the number of words that can be used in the memory, but this is not always a good way of proceeding. Indeed, in particular in the operations of storage of pure data, one can retain as length of memory word, either fixed lengths: for example 30 bytes (each byte can be assigned to a character), or a variable length. But in this case, after each recorded information, a separating byte (character) must appear, for example corresponding in ASCII language to a star or a slash or other slash.
- Such a structure has the disadvantage that it needs to be known in a precise manner by the programmers who use the cards, which in some cases leads to cumbersome use. Even for a very simple application it is necessary to know perfectly all the operation of the card and the microprocessor.
- the fixed-length format can, in most cases, lead to a systematic loss of space due to over-sizing of the word lengths to overcome all the problems.
- Security or access right issues to card data are related to the location of that data in memory.
- the object of the invention is to remedy these drawbacks and limitations, by proposing a completely different structure and organization of the data of the applications on the card, the security of which does not require imposing on the data specific places in memory.
- this structure instead of associating as an inseparable element, on the one hand an identifier relating to the application, on the other hand protection conditions, and finally allocations of memory areas with which the applications work, we preferred organize the relationships between these different concepts hierarchically. As we will see later, we first create a relationship between applications, identifiers, and preferably secret codes. This relationship is stored in the card in a table called the application table.
- a second table called the table of tables
- the relationships which may exist between a given application and a data table with which this application works are recorded.
- the creation of a data table is only authorized for a application owner.
- the data table concerned will then be said, in the remainder of this presentation, as belonging to the application.
- a third table called the rights table, the possibilities of interaction of the various applications and user applications on the tables created are organized.
- the system of the invention makes it possible to modify data tables as and when required, the creation and destruction, by the owner of an application, of his user applications, and delegation, also by this same application owner, access rights on his data tables to other applications or user applications.
- User applications can work on data tables already present in the card memory, as far as the holder of the application allows (table of rights).
- the subject of the invention is therefore, a method of loading and managing several applications in a smart card, characterized in that in the memory of the smart card - a table of applications is created (CREATE) (BANK, GARAGE , SEC SOC),
- FIG. 2 the schematic representation of a smart card according to the invention and its use as a transaction tool
- FIG. 3 to 5 precise representations respectively of the application tables, table tables and rights tables
- FIG. 2 represents a schematic organization of a smart card according to the invention.
- This smart card 10 comprises, on a support, an electronic circuit provided with means of exchange with the outside world, not shown but of known type (contact metallizations).
- This electronic circuit comprises a microprocessor 11 and a data memory 12 (in an example this data memory 12 is of the EEPROM type, that is to say that it is programmable and erasable).
- the chip of the smart card also includes a program memory 13 (ROM) which contains the instructions of the microprocessor specific to the invention. According to what has been indicated previously, in the memory of the chip there is recognized, in addition to the data memory 12, the presence of a table of applications 14, a table of tables 15, and a table of rights 16.
- ROM program memory 13
- table 17 of the encryption keys. Since table 17 is specific, it can also be defined additionally in the table of tables 15. This allows encrypted transmission of the data read in the memory 12.
- the microprocessor 11 is connected to the different memories 12 to 17 by a data and address bus 110.
- a typical architecture of a microprocessor is moreover described in the book: "Understanding Microprocessors” by Daniel Queyssac, Radio Editions, France 1983.
- a reader 18 When using such a smart card 10, it is introduced into a reader 18 itself comprising a microprocessor (not shown) capable of executing with the card 10 a program 19 using a keyboard 20, a display monitor 21 and a machine 22.
- a microprocessor capable of executing with the card 10 a program 19 using a keyboard 20, a display monitor 21 and a machine 22.
- an operator acting on the keyboard 20 can cause a withdrawal, and therefore cause the execution of part of the program 19, by which the machine 22 will distribute banknotes to him. bank 23.
- the reader will record in the smart card (or in a centralized management system not shown) the debit of the corresponding account.
- a BANK application a GARAGE application
- SECSOC social security application we could have included other applications for example, TELECOM for telecommunications or other.
- TELECOM for telecommunications or other.
- the interest of the invention comes from the fact that different operators, different issuers, also known as application owners, without contractual relations with each other, can use the same medium and this without risk as the actions carried out by one of the owners of applications or users do not influence data stored in data tables belonging to another application owner (we can easily measure the risk that this would entail in the banking field).
- the banking application we show on the screen of the monitor 21, several possible uses: there are, for example, the WITHDRAWAL, TRANSFER, VISUALIZATION uses.
- a maximum usable memory size is defined for each application or user application.
- this magnitude information is stored in a counter present in the applications table, when by adding data to a row of a data table by an application or a user application, the content of the counter is reduced by the number of characters inserted. In the case of data destruction in a row of the table, it is increased by the number of characters deleted.
- a number of lines of information the size of the line can be free (within the limit of the available space).
- the application table contains, at least at the start, a specific application called
- the CREATE order With this CREATE command, you can register all the applications and user applications you want. With this operation, the manufacturer can insert applications into the application table 14 which is also that of user applications. To do this, simply send the CREATE order to the card, followed by the name of the application, the secret code assigned to this application, the memory space usable by this application and the authorized number of unsuccessful presentation attempts. of secret code for this application. To distinguish user applications from applications, we add to this order a parameter A for applications and U for user applications.
- the card has a couple of CREATE APPLICATION and CREATE APPLICATIONUSER orders whose parameters are the same as for the previous CREATE, but which then automatically place the indications A or U respectively.
- CREATE APPLICATION and CREATE APPLICATIONUSER orders whose parameters are the same as for the previous CREATE, but which then automatically place the indications A or U respectively.
- FIG. 3 There is shown in Figure 3, the association of encryption keys with applications.
- the application table 14 can include, as the fifth column, a column representative of the encryption keys.
- the encryption keys must be indicated once and for all: they can never be modified since table 14 may no longer be accessible after the CLOSE command.
- the table 17 of the encryption keys being modifiable: the value of the key can be modified for each application.
- the ciphers discussed here are DES or RSA ciphers known elsewhere for which the configuration of the encryption requires a key, said to be secret when it is known only by a user and when it is dependent on only one use, or said to be public when '' it is common to all users of the application.
- the encryption of a data consists in modifying this data according to such an algorithm thus parameterized.
- the microprocessor is provided in a known manner with the instructions necessary for the execution of such an algorithm. By this principle, the microprocessor of the card can implement the encryption keys attached to an application without the applications having to share keys.
- the key table must contain the key and the application for which it is intended for each line.
- Table 15 of the data tables is created progressively by the owners of the applications according to the flowchart presented in FIG. 9.
- an owner of The application executes, as before, a PRESENT command, in this case "PRESENT BANK".
- a PRESENT command in this case "PRESENT BANK”.
- the microprocessor according to the algorithm already studied previously requests that the concordance of the secret code, associated with BANK in table 14, here "FORTUNE", with a secret code entered on the keyboard can be verified. If this verification is successful, the MADE or REMOVE orders can be executed.
- the comparison of the secret code is carried out and causes the recording, if successful, of a similar YES indication, in a secret code register of the microprocessor. Then, the microprocessor resumes waiting for order.
- the microprocessor checks after the analysis of these orders that the application (BANK) for. which these orders have been launched is associated, in table 14 of the applications, with an indication of type A allowing the creation of data table. If the indication is U, creation or deletion is prohibited.
- the automatic program linked to this command carries the content of the current application register at the place, in table 14, of the name of the application. It's automatic. In the example where we are dealing with the BANK application, this application name is automatically carried by the microprocessor in the corresponding column. We must then specify, in a predetermined order, the name of the table and define the table and the columns.
- the definition of the table essentially includes the designation of the number of columns and, for each column, the designation of the type of the column: variable length column or fixed length. It is also necessary to indicate the maximum length of the column (whether variable length or fixed length). Preferably this length will be between l and 255.
- each column of the data table must be given a name.
- table 16 known as the fee table.
- an application owner for example a bank that owns the application
- a PRESENT command is already executed as seen above.
- this PRESENT command will be followed by the name of the user application (or also of the application) for which these commands are to be executed. It is also followed by the presentation of the affected secret code. If successful, the name of the user application is entered in the register of the current application and the YES indication is entered in the secret code register.
- the SELECT command can be launched as follows. Its syntax includes SELECT, followed by the name of the table, and followed by one or more selection criteria.
- FIG 11 shows the flow chart of the SELECT order.
- the result of the selections is stored in a selection register.
- the fact that the application has (or does not have) rights on the data table is extracted from the rights table 16.
- the existence of the data table, and, in this data table, one or more columns with the specified names is taken from table 15 of the data tables.
- any operation of known type can be performed with this or these data.
- the INSERT order, figure 12 has the same antecedent steps as the SELECT order before A.
- the syntax of this order includes this INSERT order, followed in line by all the values to be entered, in the order in which they must be registered.
- the microprocessor checks that the memory allocation of the application and that the usable memory size is sufficient.
- the areas of the table 14 where these usable memory sizes are stored are erasable and modifiable areas, preferably of the EEPROM type. Indeed, after the insertion, the value recorded in such an area, for the application concerned is decremented by the space occupied by the size of the insertion that has just been made. This explains why a user application whose usable memory size is zero (from the start or as a result of insertion execution) cannot insert into the data table.
- the DELETE order is of the same type as the INSERT order, except that it works in reverse. In this case, the counter is incremented at the end. However, to avoid that a user application, which has from the start no usable memory size, cannot acquire one on a data table, it is checked beforehand, in the rights table 15 that the erasure is authorized. This verification is of the same type as the verification of the right to execute the insertion order.
- the MODIF update order has the same syntax as the selection order followed by the name of a column then a value. This means placing the new value, in the selected row or rows, at the location of the specified column.
- the update can also make it possible to update several different columns, nevertheless corresponding to the same selection criteria.
- the V views are sub-tables. They allow direct access to records which correspond in a data table to selections on data.
- the views are declared in table 15 of the data tables in the same way as the applications or user-applications. The only difference relates to the specifications of the columns which, in their case, are similar to a selection. These column specifications therefore comprise on the one hand the name of the data table (for example TABLE2) to which the selection relates and on the other hand, the selection itself. This selection is indicated in the same terms as the syntax of the SELECT statement seen above.
- the user applications affected by the views can receive selection and modification rights but preferably no insertion or deletion.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Credit Cards Or The Like (AREA)
Abstract
On organise d'une matière différente le chargement de plusieurs applications dans une carte à puce en créant un ensemble de tables: essentiellement quatre tables. Une première table dite table des applications permet de créer des couples fondamentaux entre des noms d'applications et des codes secrets, elle est en principe enregistrée une fois pour toute, même déjà chez la fabricant de la carte à puce. Une seconde table modifiable à volonté dite table des tableaux de données, permet à chaque application de créer autant de tableaux de données que l'on désire. Une troisième table dite table des droits permet d'octroyer, par une application, et sur des tableaux de données créés, par cette application, des droits spécifiques liés à des utilisations. Une quatrième table contenant des clefs attachées à une application permet la mise en oeuvre de fonction de chiffrement. On montre que de cette manière on empêche à une utilisation de venir modifier ou lire des information enregistrées dans la carte à puce au titre d'une autre application. L'invention présente par rapport aux solutions de l'état de la technique, l'avantage d'être plus souple et de permettre une modification ultérieure.We organize the loading of several applications into a smart card with a different material by creating a set of tables: essentially four tables. A first table, called the applications table, creates fundamental couples between application names and secret codes, it is in principle registered once and for all, even already with the manufacturer of the smart card. A second table that can be modified at will, called the data table table, allows each application to create as many data tables as desired. A third table, known as the rights table, makes it possible to grant, by an application, and on data tables created, by this application, specific rights linked to uses. A fourth table containing keys attached to an application allows the implementation of the encryption function. It is shown that in this way a use is prevented from modifying or reading information recorded in the smart card under another application. The invention has the advantage over the solutions of the state of the art of being more flexible and allowing subsequent modification.
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9100560 | 1991-01-18 | ||
FR9100560A FR2673476B1 (en) | 1991-01-18 | 1991-01-18 | SECURE METHOD FOR LOADING MULTIPLE APPLICATIONS INTO A MICROPROCESSOR MEMORY CARD. |
PCT/FR1992/000039 WO1992013322A1 (en) | 1991-01-18 | 1992-01-16 | Secured method for loading a plurality of applications into a microprocessor memory card |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0589884A1 true EP0589884A1 (en) | 1994-04-06 |
EP0589884B1 EP0589884B1 (en) | 1995-10-11 |
Family
ID=9408823
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP92903974A Expired - Lifetime EP0589884B1 (en) | 1991-01-18 | 1992-01-16 | Secured method for loading a plurality of applications into a microprocessor memory card |
Country Status (7)
Country | Link |
---|---|
US (1) | US5473690A (en) |
EP (1) | EP0589884B1 (en) |
JP (1) | JPH06504862A (en) |
DE (1) | DE69205425T2 (en) |
ES (1) | ES2082451T3 (en) |
FR (1) | FR2673476B1 (en) |
WO (1) | WO1992013322A1 (en) |
Families Citing this family (163)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2683357A1 (en) * | 1991-10-30 | 1993-05-07 | Philips Composants | MICROCIRCUIT FOR PROTECTED PROGRAMMABLE MEMORY CHIP CARD. |
EP0583006B2 (en) * | 1992-08-13 | 2006-11-29 | Matsushita Electric Industrial Co., Ltd. | IC card with hierarchical file structure |
FR2696854A1 (en) * | 1992-10-09 | 1994-04-15 | Kudelski Sa Fabrique Enreg Nag | Information processing system using a set of memory cards. |
JP3329496B2 (en) * | 1992-11-04 | 2002-09-30 | 富士通株式会社 | IC card |
US5267314A (en) * | 1992-11-17 | 1993-11-30 | Leon Stambler | Secure transaction system and method utilized therein |
EP2296388A3 (en) | 1993-06-15 | 2011-03-30 | Celltrace LLC | Telecommunications system |
US5544246A (en) * | 1993-09-17 | 1996-08-06 | At&T Corp. | Smartcard adapted for a plurality of service providers and for remote installation of same |
JP3594980B2 (en) * | 1993-12-10 | 2004-12-02 | 株式会社東芝 | File management method |
US5578808A (en) * | 1993-12-22 | 1996-11-26 | Datamark Services, Inc. | Data card that can be used for transactions involving separate card issuers |
USH1794H (en) * | 1994-02-08 | 1999-04-06 | At&T Corp. | Secure money transfer techniques using hierarchical arrangement of smart cards |
FR2730330B1 (en) * | 1995-02-02 | 1997-04-18 | Cohen Solal Bernard Simon | INTERACTIVE UNIVERSAL INFORMATION SYSTEM PER DEVICE AND MULTI-SERVICE CARD |
US5594935A (en) * | 1995-02-23 | 1997-01-14 | Motorola, Inc. | Interactive image display system of wide angle images comprising an accounting system |
US5677955A (en) * | 1995-04-07 | 1997-10-14 | Financial Services Technology Consortium | Electronic funds transfer instruments |
US5721781A (en) * | 1995-09-13 | 1998-02-24 | Microsoft Corporation | Authentication system and method for smart card transactions |
WO1997010562A1 (en) * | 1995-09-14 | 1997-03-20 | Cybermark, L.L.C. | Programming interface for a smart card kiosk |
KR0183796B1 (en) * | 1995-12-28 | 1999-05-15 | 김광호 | Chip operating system |
JPH09212565A (en) * | 1996-02-07 | 1997-08-15 | Nec Corp | Radio portable terminal system |
AU1414197A (en) * | 1996-02-26 | 1997-09-10 | Motorola, Inc. | Personal human genome card and methods and systems for producing same |
US6038551A (en) * | 1996-03-11 | 2000-03-14 | Microsoft Corporation | System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer |
US6126078A (en) * | 1996-03-11 | 2000-10-03 | Kaba Schliesssysteme Ag | Identification medium with passive electronic data carrier storing a plurality of independent applications |
EP0798674B1 (en) * | 1996-03-29 | 2002-03-06 | Kabushiki Kaisha Toshiba | File managing method requiring a change in key data and ic card device using the method |
EP0818761A1 (en) * | 1996-07-12 | 1998-01-14 | Koninklijke KPN N.V. | Integrated circuit card, secure application module, system comprising a secure application module and a terminal and a method for controlling service actions to be carried out by the secure application module on the integrated circuit card |
US6021202A (en) | 1996-12-20 | 2000-02-01 | Financial Services Technology Consortium | Method and system for processing electronic documents |
TR199901431T2 (en) * | 1996-12-23 | 1999-10-21 | Deutsche Bank Ag | IP card and usage method. |
US6575372B1 (en) | 1997-02-21 | 2003-06-10 | Mondex International Limited | Secure multi-application IC card system having selective loading and deleting capability |
US6317832B1 (en) | 1997-02-21 | 2001-11-13 | Mondex International Limited | Secure multiple application card system and process |
DE19716015A1 (en) * | 1997-04-17 | 1998-10-29 | Ibm | Introducing information on a chip card |
US6385723B1 (en) | 1997-05-15 | 2002-05-07 | Mondex International Limited | Key transformation unit for an IC card |
US6328217B1 (en) | 1997-05-15 | 2001-12-11 | Mondex International Limited | Integrated circuit card with application history list |
US6488211B1 (en) | 1997-05-15 | 2002-12-03 | Mondex International Limited | System and method for flexibly loading in IC card |
US6220510B1 (en) | 1997-05-15 | 2001-04-24 | Mondex International Limited | Multi-application IC card with delegation feature |
US6164549A (en) | 1997-05-15 | 2000-12-26 | Mondex International Limited | IC card with shell feature |
US6230267B1 (en) | 1997-05-15 | 2001-05-08 | Mondex International Limited | IC card transportation key set |
US6431453B1 (en) * | 1997-05-20 | 2002-08-13 | Dynetics Engineering Corporation, Inc. | Automated card insertion system with card multireader and method |
JPH1153482A (en) * | 1997-07-31 | 1999-02-26 | Fujitsu Ltd | Card reader |
US5991519A (en) * | 1997-10-03 | 1999-11-23 | Atmel Corporation | Secure memory having multiple security levels |
JPH11120300A (en) * | 1997-10-09 | 1999-04-30 | Fujitsu Ltd | Portable card medium, memory space managing method for portable card medium, issuing method for portable card medium, program data writing method for portable card medium, and medium on which memory space managing program is recorded |
EP1023703B1 (en) * | 1997-10-14 | 2004-06-09 | Visa International Service Association | Personalization of smart cards |
FR2770071B1 (en) * | 1997-10-16 | 1999-12-24 | France Telecom | PERSON IDENTIFICATION SYSTEM |
RU2126169C1 (en) * | 1997-12-03 | 1999-02-10 | Веселов Владимир Федорович | Method for protection of private information of user in public information processing system |
US6484946B2 (en) * | 1997-12-22 | 2002-11-26 | Hitachi, Ltd. | IC card information display device and IC card for use therewith |
US6357665B1 (en) | 1998-01-22 | 2002-03-19 | Mondex International Limited | Configuration of IC card |
US6736325B1 (en) | 1998-01-22 | 2004-05-18 | Mondex International Limited | Codelets |
US6742120B1 (en) | 1998-02-03 | 2004-05-25 | Mondex International Limited | System and method for controlling access to computer code in an IC card |
ATE249662T1 (en) * | 1998-02-03 | 2003-09-15 | Mondex Int Ltd | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO THE COMPUTER CODE IN A CHIP CARD |
US6199762B1 (en) * | 1998-05-06 | 2001-03-13 | American Express Travel Related Services Co., Inc. | Methods and apparatus for dynamic smartcard synchronization and personalization |
US7357312B2 (en) | 1998-05-29 | 2008-04-15 | Gangi Frank J | System for associating identification and personal data for multiple magnetic stripe cards or other sources to facilitate a transaction and related methods |
US6131811A (en) | 1998-05-29 | 2000-10-17 | E-Micro Corporation | Wallet consolidator |
DE19839847A1 (en) * | 1998-09-02 | 2000-03-09 | Ibm | Storage of data objects in the memory of a chip card |
US6609199B1 (en) * | 1998-10-26 | 2003-08-19 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
US7139915B2 (en) | 1998-10-26 | 2006-11-21 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
US6330670B1 (en) | 1998-10-26 | 2001-12-11 | Microsoft Corporation | Digital rights management operating system |
US7174457B1 (en) * | 1999-03-10 | 2007-02-06 | Microsoft Corporation | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party |
US6820063B1 (en) | 1998-10-26 | 2004-11-16 | Microsoft Corporation | Controlling access to content based on certificates and access predicates |
US6327652B1 (en) | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
US20050060549A1 (en) * | 1998-10-26 | 2005-03-17 | Microsoft Corporation | Controlling access to content based on certificates and access predicates |
US7194092B1 (en) * | 1998-10-26 | 2007-03-20 | Microsoft Corporation | Key-based secure storage |
FR2785424B1 (en) * | 1998-10-30 | 2000-12-15 | Schlumberger Ind Sa | DEVICE FOR MANAGING ACCESS IN AN INTEGRATED CIRCUIT CARD |
FR2786008B1 (en) * | 1998-11-13 | 2001-04-27 | Gemplus Card Int | METHOD AND DEVICE FOR MONITORING THE LIFE CYCLE OF A PORTABLE OBJECT, ESPECIALLY A SMART CARD |
US6381576B1 (en) * | 1998-12-16 | 2002-04-30 | Edward Howard Gilbert | Method, apparatus, and data structure for capturing and representing diagnostic, treatment, costs, and outcomes information in a form suitable for effective analysis and health care guidance |
JP3545627B2 (en) * | 1999-02-08 | 2004-07-21 | 株式会社東芝 | Portable electronic devices |
AU777610B2 (en) * | 1999-02-22 | 2004-10-21 | Cards Etc. Pty Limited | Card, device, product and product management system |
US6651171B1 (en) * | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
EP1179209A1 (en) * | 1999-05-11 | 2002-02-13 | Microsoft Corporation | Method and apparatus for sharing data files among runtime environment applets in an integrated circuit card |
US6547150B1 (en) | 1999-05-11 | 2003-04-15 | Microsoft Corporation | Smart card application development system and method |
US6845498B1 (en) | 1999-05-11 | 2005-01-18 | Microsoft Corporation | Method and apparatus for sharing data files among run time environment applets in an integrated circuit card |
US6938244B1 (en) | 1999-05-11 | 2005-08-30 | Microsoft Corp. | Interlaced protocol for smart card application development |
DE19937529A1 (en) * | 1999-08-09 | 2001-03-01 | Giesecke & Devrient Gmbh | Portable media and method for use in a variety of applications |
FR2797968B1 (en) * | 1999-08-24 | 2001-10-12 | Schlumberger Systems & Service | DEVICE AND METHOD FOR LOADING CONTROLS IN AN INTEGRATED CIRCUIT CARD |
AUPQ268999A0 (en) * | 1999-09-07 | 1999-09-30 | Keycorp Limited | Application management for multi application devices |
KR100801392B1 (en) | 1999-11-17 | 2008-02-05 | 소니 가부시끼 가이샤 | Method and apparatus for digital signal processing |
JP4581316B2 (en) | 1999-11-17 | 2010-11-17 | ソニー株式会社 | Digital television receiver and extended function providing method in digital television receiver |
FR2801118B1 (en) * | 1999-11-17 | 2001-12-21 | Bull Cp8 | METHOD FOR LOADING APPLICATIONS IN A MULTI-APPLICATION ON-BOARD SYSTEM, CORRESPONDING ON-BOARD SYSTEM, AND METHOD FOR EXECUTING AN APPLICATION OF THE ON-BOARD SYSTEM |
US6757824B1 (en) * | 1999-12-10 | 2004-06-29 | Microsoft Corporation | Client-side boot domains and boot rules |
US6915277B1 (en) * | 2000-05-10 | 2005-07-05 | General Electric Capital Corporation | Method for dual credit card system |
US6755341B1 (en) | 2000-05-15 | 2004-06-29 | Jacob Y. Wong | Method for storing data in payment card transaction |
US6805288B2 (en) | 2000-05-15 | 2004-10-19 | Larry Routhenstein | Method for generating customer secure card numbers subject to use restrictions by an electronic card |
US6609654B1 (en) | 2000-05-15 | 2003-08-26 | Privasys, Inc. | Method for allowing a user to customize use of a payment card that generates a different payment card number for multiple transactions |
US6592044B1 (en) | 2000-05-15 | 2003-07-15 | Jacob Y. Wong | Anonymous electronic card for generating personal coupons useful in commercial and security transactions |
AU2001275298A1 (en) * | 2000-06-06 | 2001-12-17 | Ingeo Systems, Inc. | Creating and verifying electronic documents |
US6587762B1 (en) * | 2000-08-18 | 2003-07-01 | Fxc Corporation | Automatic guidance unit for aerial delivery unit |
US7237123B2 (en) | 2000-09-22 | 2007-06-26 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
WO2002025415A2 (en) * | 2000-09-22 | 2002-03-28 | Edc Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
DE10048856A1 (en) * | 2000-10-02 | 2002-04-11 | Werner Brauweiler | Use of customer-orientated electronic identification system evaluates personal data and produces relevant audiovisual display and accounts |
JP2002149495A (en) * | 2000-11-15 | 2002-05-24 | Nec Corp | Memory management system and its method, and recording medium with the method recorded thereon |
US6938164B1 (en) | 2000-11-22 | 2005-08-30 | Microsoft Corporation | Method and system for allowing code to be securely initialized in a computer |
FR2822256B1 (en) * | 2001-03-13 | 2003-05-30 | Gemplus Card Int | VERIFICATION OF CONFORMITY OF ACCESS TO OBJECTS IN A DATA PROCESSING SYSTEM WITH A SECURITY POLICY |
GB0106082D0 (en) | 2001-03-13 | 2001-05-02 | Mat & Separations Tech Int Ltd | Method and equipment for removing volatile compounds from air |
US7328453B2 (en) | 2001-05-09 | 2008-02-05 | Ecd Systems, Inc. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
FR2826472B1 (en) * | 2001-06-22 | 2003-10-03 | Gemplus Card Int | PROCESS FOR VERIFYING ACCESS RIGHTS TO COMPUTER FILES |
WO2003003194A1 (en) * | 2001-06-27 | 2003-01-09 | Sony Corporation | Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device |
US7762457B2 (en) | 2001-07-10 | 2010-07-27 | American Express Travel Related Services Company, Inc. | System and method for dynamic fob synchronization and personalization |
US7195154B2 (en) | 2001-09-21 | 2007-03-27 | Privasys, Inc. | Method for generating customer secure card numbers |
US7207060B2 (en) * | 2001-10-18 | 2007-04-17 | Nokia Corporation | Method, system and computer program product for secure ticketing in a communications device |
JP3826764B2 (en) * | 2001-10-31 | 2006-09-27 | ソニー株式会社 | Data processing method, data processing apparatus, and program |
US7159240B2 (en) * | 2001-11-16 | 2007-01-02 | Microsoft Corporation | Operating system upgrades in a trusted operating system environment |
US7137004B2 (en) | 2001-11-16 | 2006-11-14 | Microsoft Corporation | Manifest-based trusted agent management in a trusted operating system environment |
US7243230B2 (en) * | 2001-11-16 | 2007-07-10 | Microsoft Corporation | Transferring application secrets in a trusted operating system environment |
US7487365B2 (en) * | 2002-04-17 | 2009-02-03 | Microsoft Corporation | Saving and retrieving data based on symmetric key encryption |
US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
US8010405B1 (en) | 2002-07-26 | 2011-08-30 | Visa Usa Inc. | Multi-application smart card device software solution for smart cardholder reward selection and redemption |
US7121456B2 (en) | 2002-09-13 | 2006-10-17 | Visa U.S.A. Inc. | Method and system for managing token image replacement |
US9852437B2 (en) | 2002-09-13 | 2017-12-26 | Visa U.S.A. Inc. | Opt-in/opt-out in loyalty system |
US8626577B2 (en) | 2002-09-13 | 2014-01-07 | Visa U.S.A | Network centric loyalty system |
US8015060B2 (en) | 2002-09-13 | 2011-09-06 | Visa Usa, Inc. | Method and system for managing limited use coupon and coupon prioritization |
US6920611B1 (en) | 2002-11-25 | 2005-07-19 | Visa U.S.A., Inc. | Method and system for implementing a loyalty merchant component |
US7827077B2 (en) | 2003-05-02 | 2010-11-02 | Visa U.S.A. Inc. | Method and apparatus for management of electronic receipts on portable devices |
US8554610B1 (en) | 2003-08-29 | 2013-10-08 | Visa U.S.A. Inc. | Method and system for providing reward status |
US7104446B2 (en) | 2003-09-03 | 2006-09-12 | Visa U.S.A., Inc. | Method, system and portable consumer device using wildcard values |
US7051923B2 (en) | 2003-09-12 | 2006-05-30 | Visa U.S.A., Inc. | Method and system for providing interactive cardholder rewards image replacement |
US8005763B2 (en) | 2003-09-30 | 2011-08-23 | Visa U.S.A. Inc. | Method and system for providing a distributed adaptive rules based dynamic pricing system |
US8407083B2 (en) | 2003-09-30 | 2013-03-26 | Visa U.S.A., Inc. | Method and system for managing reward reversal after posting |
US9123077B2 (en) | 2003-10-07 | 2015-09-01 | Hospira, Inc. | Medication management system |
US8065161B2 (en) | 2003-11-13 | 2011-11-22 | Hospira, Inc. | System for maintaining drug information and communicating with medication delivery devices |
JP4638135B2 (en) * | 2003-10-14 | 2011-02-23 | ソニー株式会社 | Information storage medium |
US7653602B2 (en) | 2003-11-06 | 2010-01-26 | Visa U.S.A. Inc. | Centralized electronic commerce card transactions |
US9020854B2 (en) | 2004-03-08 | 2015-04-28 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
GB2416618B (en) * | 2004-07-23 | 2008-10-15 | Landis & Gyr Ag | Improvements in or relating to pre-payment facilities |
BRPI0419000A (en) * | 2004-08-13 | 2007-12-11 | Telecom Italia Spa | method and system for secure administration of data records stored on an electronic tag, and electronic tag |
KR100471007B1 (en) * | 2004-08-27 | 2005-03-14 | 케이비 테크놀러지 (주) | Smart card for ensuring an independent nature of security domain |
EP1829283A2 (en) | 2004-12-20 | 2007-09-05 | Proxense, LLC | Biometric personal data key (pdk) authentication |
JP3944216B2 (en) * | 2005-03-11 | 2007-07-11 | 株式会社エヌ・ティ・ティ・ドコモ | Authentication device, portable terminal, and authentication method |
US8433919B2 (en) | 2005-11-30 | 2013-04-30 | Proxense, Llc | Two-level authentication for secure transactions |
US8036152B2 (en) | 2006-01-06 | 2011-10-11 | Proxense, Llc | Integrated power management of a client device via system time slot assignment |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US7591419B2 (en) * | 2006-03-28 | 2009-09-22 | HSBC Card Services Inc. | User selectable functionality facilitator |
JP2010507176A (en) | 2006-10-16 | 2010-03-04 | ホスピラ・インコーポレイテツド | System and method for comparing and utilizing dynamic information and configuration information from multiple device management systems |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
WO2009062194A1 (en) * | 2007-11-09 | 2009-05-14 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
WO2009079666A1 (en) | 2007-12-19 | 2009-06-25 | Proxense, Llc | Security system and method for controlling access to computing resources |
US8508336B2 (en) | 2008-02-14 | 2013-08-13 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US8789753B1 (en) | 2008-03-28 | 2014-07-29 | Oracle International Corporation | Method for using and maintaining user data stored on a smart card |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US20100191652A1 (en) * | 2009-01-23 | 2010-07-29 | Eckert Daniel J | Systems and methods for adding functionality to a uis for use at a point of interaction |
US8271106B2 (en) | 2009-04-17 | 2012-09-18 | Hospira, Inc. | System and method for configuring a rule set for medical event management and responses |
US20110145082A1 (en) | 2009-12-16 | 2011-06-16 | Ayman Hammad | Merchant alerts incorporating receipt data |
US8429048B2 (en) | 2009-12-28 | 2013-04-23 | Visa International Service Association | System and method for processing payment transaction receipts |
JP5377748B2 (en) * | 2010-02-18 | 2013-12-25 | 株式会社東芝 | program |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US8918854B1 (en) | 2010-07-15 | 2014-12-23 | Proxense, Llc | Proximity-based system for automatic application initialization |
US9265450B1 (en) | 2011-02-21 | 2016-02-23 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
JP6033874B2 (en) | 2011-10-21 | 2016-11-30 | ホスピーラ インコーポレイテッド | Medical device update system |
ES2908320T3 (en) | 2013-03-06 | 2022-04-28 | Icu Medical Inc | Medical device communication method |
WO2014183106A2 (en) | 2013-05-10 | 2014-11-13 | Proxense, Llc | Secure element as a digital pocket |
US20150066531A1 (en) | 2013-08-30 | 2015-03-05 | James D. Jacobson | System and method of monitoring and managing a remote infusion regimen |
US9662436B2 (en) | 2013-09-20 | 2017-05-30 | Icu Medical, Inc. | Fail-safe drug infusion therapy system |
US10311972B2 (en) | 2013-11-11 | 2019-06-04 | Icu Medical, Inc. | Medical device system performance index |
US10042986B2 (en) | 2013-11-19 | 2018-08-07 | Icu Medical, Inc. | Infusion pump automation system and method |
WO2015168427A1 (en) | 2014-04-30 | 2015-11-05 | Hospira, Inc. | Patient care system with conditional alarm forwarding |
US9724470B2 (en) | 2014-06-16 | 2017-08-08 | Icu Medical, Inc. | System for monitoring and delivering medication to a patient and method of using the same to minimize the risks associated with automated therapy |
US9539383B2 (en) | 2014-09-15 | 2017-01-10 | Hospira, Inc. | System and method that matches delayed infusion auto-programs with manually entered infusion programs and analyzes differences therein |
US10417244B2 (en) * | 2014-09-22 | 2019-09-17 | Red Hat, Inc. | Just-in-time computation in a federated system |
EP3304370B1 (en) | 2015-05-26 | 2020-12-30 | ICU Medical, Inc. | Infusion pump system and method with multiple drug library editor source capability |
NZ750032A (en) | 2016-07-14 | 2020-05-29 | Icu Medical Inc | Multi-communication path selection and security system for a medical device |
CN108345785B (en) * | 2017-01-25 | 2021-05-11 | 杨建纲 | Built-in intelligent safety action device |
CA3106519A1 (en) | 2018-07-17 | 2020-01-23 | Icu Medical, Inc. | Systems and methods for facilitating clinical messaging in a network environment |
AU2019306490A1 (en) | 2018-07-17 | 2021-02-04 | Icu Medical, Inc. | Updating infusion pump drug libraries and operational software in a networked environment |
US10964428B2 (en) | 2018-07-17 | 2021-03-30 | Icu Medical, Inc. | Merging messages into cache and generating user interface using the cache |
US10861592B2 (en) | 2018-07-17 | 2020-12-08 | Icu Medical, Inc. | Reducing infusion pump network congestion by staggering updates |
US10692595B2 (en) | 2018-07-26 | 2020-06-23 | Icu Medical, Inc. | Drug library dynamic version management |
WO2020023231A1 (en) | 2018-07-26 | 2020-01-30 | Icu Medical, Inc. | Drug library management system |
CN109746767A (en) * | 2019-02-28 | 2019-05-14 | 中车青岛四方机车车辆股份有限公司 | The application method and cutter of a kind of management-control method of cutter, cutter |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60160491A (en) * | 1984-01-31 | 1985-08-22 | Toshiba Corp | Ic card |
US4829169A (en) * | 1985-07-01 | 1989-05-09 | Toppan Moore Company, Inc. | IC card having state marker for record access |
DE3682476D1 (en) * | 1985-10-07 | 1991-12-19 | Toshiba Kawasaki Kk | PORTABLE ELECTRONIC DEVICE. |
US4849614A (en) * | 1985-12-27 | 1989-07-18 | Toppan Moore Company, Ltd. | Composite IC card |
US4742215A (en) * | 1986-05-07 | 1988-05-03 | Personal Computer Card Corporation | IC card system |
US4816653A (en) * | 1986-05-16 | 1989-03-28 | American Telephone And Telegraph Company | Security file system for a portable data carrier |
JPH087720B2 (en) * | 1986-09-16 | 1996-01-29 | 富士通株式会社 | Area access method for IC cards for multiple services |
JPS6373388A (en) * | 1986-09-16 | 1988-04-02 | Fujitsu Ltd | Area acquiring system for ic card for plural services |
JPS63231692A (en) * | 1987-03-20 | 1988-09-27 | Mitsubishi Electric Corp | Secret code writer |
US4868376A (en) * | 1987-05-15 | 1989-09-19 | Smartcard International Inc. | Intelligent portable interactive personal data system |
JP2695855B2 (en) * | 1988-08-26 | 1998-01-14 | 株式会社東芝 | Portable electronic devices |
US5161256A (en) * | 1988-08-26 | 1992-11-03 | Kabushiki Kaisha Toshiba | Method and system for allocating file area in memory area of ic card |
-
1991
- 1991-01-18 FR FR9100560A patent/FR2673476B1/en not_active Expired - Lifetime
-
1992
- 1992-01-16 EP EP92903974A patent/EP0589884B1/en not_active Expired - Lifetime
- 1992-01-16 US US08/090,039 patent/US5473690A/en not_active Expired - Lifetime
- 1992-01-16 DE DE69205425T patent/DE69205425T2/en not_active Expired - Lifetime
- 1992-01-16 ES ES92903974T patent/ES2082451T3/en not_active Expired - Lifetime
- 1992-01-16 JP JP4504010A patent/JPH06504862A/en active Granted
- 1992-01-16 WO PCT/FR1992/000039 patent/WO1992013322A1/en active IP Right Grant
Non-Patent Citations (1)
Title |
---|
See references of WO9213322A1 * |
Also Published As
Publication number | Publication date |
---|---|
FR2673476B1 (en) | 1996-04-12 |
DE69205425T2 (en) | 1996-03-21 |
FR2673476A1 (en) | 1992-09-04 |
WO1992013322A1 (en) | 1992-08-06 |
JPH06504862A (en) | 1994-06-02 |
DE69205425D1 (en) | 1995-11-16 |
ES2082451T3 (en) | 1996-03-16 |
EP0589884B1 (en) | 1995-10-11 |
US5473690A (en) | 1995-12-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0589884B1 (en) | Secured method for loading a plurality of applications into a microprocessor memory card | |
EP0018889B1 (en) | Process for prolonging the validity of the memory working zone of a data carrier | |
CA2035161C (en) | Transaction management method and device using microcircuit cards | |
EP0479655B1 (en) | Integrated circuit for a microprocessor-card with multiple programms in programmable memory | |
CH631561A5 (en) | PORTABLE INFORMATION MEDIUM FOR STORING AND PROCESSING INFORMATION. | |
FR2635891A1 (en) | PORTABLE ELECTRONIC DEVICE HAVING KEY DATA LIMITING ACCESS TO MEMORY | |
FR2757664A1 (en) | TERMINAL AND SELF-DIAGNOSIS OR MONITORING METHOD AND PORTABLE OBJECT USED IN SUCH A TERMINAL OR METHOD | |
FR2606909A1 (en) | PROCESSING SYSTEM FOR A PORTABLE ELECTRONIC DEVICE, SUCH AS AN INTEGRATED CIRCUIT BOARD | |
FR2687816A1 (en) | Process for customising a microchip card | |
FR2627609A1 (en) | PORTABLE ELECTRONIC DEVICE | |
CA2315363A1 (en) | Method for managing open-ended applications in a terminal/chip card system | |
EP0277440B1 (en) | Revalidatable supplying system | |
FR2622993A1 (en) | METHOD AND APPARATUS FOR PERFORMING PERSONAL IDENTIFICATION USING INTEGRATED CIRCUIT BOARD AND PORTABLE MEMORY CARRIER FOR USE | |
EP1388134A1 (en) | Method and system for managing data designed to be stored in a programmable smart card | |
EP1029312B1 (en) | Method for secure storage management | |
FR2638002A1 (en) | Personalising method for microcomputer cards and system for implementing it | |
EP0957461B1 (en) | IC-Card personalization process | |
FR2771528A1 (en) | Management of data in a smart card | |
FR2626696A1 (en) | Memory recording system for a portable electronic device of the card type | |
EP0974131B1 (en) | Dynamic data interpretation method for a chip card | |
FR2806813A1 (en) | Smart card memory management system allowing card users access to a number of services offered by a town | |
EP0944880A1 (en) | Security module comprising means generating links between main files and auxiliary files | |
WO1999042960A1 (en) | Loading block computer programmes | |
EP1233383A1 (en) | Method and device for the management of IC-card applications | |
FR2777372A1 (en) | METHOD FOR WRITING AND READING THE CONTENT OF THE NON-VOLATILE MEMORY OF A MICROCIRCUIT CARD |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 19930719 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): DE ES GB IT NL |
|
17Q | First examination report despatched |
Effective date: 19941013 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE ES GB IT NL |
|
REF | Corresponds to: |
Ref document number: 69205425 Country of ref document: DE Date of ref document: 19951116 |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 19951024 |
|
ITF | It: translation for a ep patent filed |
Owner name: PORTA CHECCACCI E BOTTI S.R.L. |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2082451 Country of ref document: ES Kind code of ref document: T3 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed | ||
REG | Reference to a national code |
Ref country code: GB Ref legal event code: IF02 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20101224 Year of fee payment: 20 Ref country code: GB Payment date: 20101230 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20101228 Year of fee payment: 20 Ref country code: DE Payment date: 20110103 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20110111 Year of fee payment: 20 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 69205425 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 69205425 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: V4 Effective date: 20120116 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: PE20 Expiry date: 20120115 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20120117 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20120115 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20130725 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20120117 |